Security Concepts
Security Concepts
Security Concepts
BSCI v3.0—2-1
Upon completion of the section, you should be able to:
• Describe the evolution of network security.
• Describe malware.
• Threat
• Vulnerability
• Mitigation
Cisco Security Intelligence Operations
• Risk
The Hacker & The Evolution of Hackers
• Vulnerability Brokers
• Hacktivists
• Cyber Criminals
• State-Sponsored
Hackers
Evolution of Security Tools
Penetration testing tools:
• Password crackers • Forensic
• Fuzzers to search
vulnerabilities
Categories of Attack Tools
Network hacking attacks:
• Eavesdropping
• Data modification
• IP address spoofing
• Password-based
• Denial-of-service
• Man-in-the-middle
• Compromised-key
• Sniffer
Viruses
Trojan Horse Classification
Classifications:
• Security software disabler
• Remote-access
• Data-sending
• Destructive
• Proxy
• FTP
• DoS
Worms
Components:
1.
Propagate
• Enabling vulnerability for 19 days
• Propagation
mechanism
• Payload 4.
Code Red 2.
Launch DoS
Repeat the
cycle
Worm attack for
next 7 days
Propagation
3.
Stop and go
dormant for
a few days
Other Malware
Ransomware Scareware
Spyware Phishing
Adware Rootkits
Types of Network Attacks
Data
Modification
Syn Flood
Smurf
Attack
Reconnaissance
Access
DoS
Reconnaissance Attacks
• Initial query of a target
• Vulnerability scanners
• Exploitation tools
Access Attacks
A few reasons why hackers use access attacks:
• To retrieve data
• To gain access
• Trust exploitation
• Port redirection
• Man-in-the-middle
• Buffer overflow
• Pretexting
• Phishing
• Spearphishing
• Spam
• Tailgating
• Baiting
Denial of Service Attacks
DDoS Attacks
1. Hacker builds a network of infected machines
• A network of infected hosts is called a botnet.
• The compromised computers are called zombies.
• Zombies are controlled by handler systems.
• Explain how to secure the three functional areas of Cisco routers and
switches.
Confidentiality, Integrity, Availability
Confidentiality:
Uses encryption to
encrypt and hide
data.
Components
of
Cryptography
Availability:
Integrity:
Assures data is
Uses hashing
accessible.
algorithms to
Guaranteed by
ensure data is
network hardening
unaltered during
mechanisms and
operation.
backup systems.
Network Security Domains
• Risk assessment
• Security policy
• Asset management
• Access control
• Compliance
Network Security Policy
Network Security Policy Objectives
Defending the Network
Best practices:
• Develop a written security policy.
Containment
Inoculation Quarantine
Treatment
Mitigating Reconnaissance Attacks
Mitigating Access Attacks
Mitigating DoS Attacks
Upon completion of this section, you should be able to:
• Secure Access in Network Infrastructure
Tasks:
• Restrict device accessibility
• Authenticate access
• Authorize actions
• Include a mix of uppercase and lowercase letters, numbers, symbols, and spaces.